Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Google starts blocking badly behaving Gmail extensions

How to deal with untrustworthy third-party add-ons that could endanger your own users? Prevent them from loading – if you can. That’s what Google recently did with …

Malware peddlers turn again to malicious links

In the continuous see-sawing that spammers and malware peddlers perform between sending out emails with malicious links and those with malicious attachments, the former method …

Researchers confirm multiple Google App Engine security sandbox bypasses

Polish firm Security Explorations, which announced last week that they found over 30 serious security issues in the Java security sandbox of the Google App Engine (GAE), has …

Sony hackers threaten company and movie-goers

Guardians of Peace, the hacker group that hit Sony Pictures Entertainment, has released another batch of data labeled simply with “Michael Lynton,” the name of the …

Top 5 malware attacks: 35 reused components

CyActive identified the top five malware that returned the highest ROI for hackers with the least effort per dollar — achieved by recycling code and using the same methods …

Protecting the underground electronic communications infrastructure

ENISA has released a new report on the Protection of Underground Electronic Communications Infrastructure. This report – targeted at Member States (MS), public …

Sony details employee data compromised in GOP hack

After having disclosed the extent of the employees’ information stolen in the recent hack to the California Attorney General’s Office, Sony Pictures Entertainment …

TorrentLocker exposed: Investigation and analysis

ESET researchers analyzed a widespread case of ransomware generally known as TorrentLocker, which started spreading in early 2014. The latest variant of the malware has …

Attackers worm their way into QNAP NAS devices through Shellshock hole

A worm intent on creating surreptitious backdoors is actively being used to compromise unpatched QNAP network-attached storage (NAS) systems around the world by exploiting the …

76% of organizations have suffered a DNS attack

Seventy-six percent of organizations in the U.S. and U.K. have suffered a DNS attack, with 49 percent experiencing one in the past 12 months, according to Cloudmark. The most …

1 in 5 employees going rogue with corporate data

Companies around the world have reason to be worried about the use of cloud applications to share mission-critical information. In fact, 1 in 5 employees has uploaded …

Help Google design the Open Web of Things

Do you have an idea how the Internet of Things should work? You might want to share it with Google. The internet giant has long had an interest in IoT technologies, but is …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools